🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to deploy and configure antivirus and EDR to meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII — practical implementation checklist

Practical step-by-step checklist for small businesses to deploy antivirus and EDR that satisfy FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII requirements.

March 28, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a concrete, actionable checklist for small businesses and IT teams to deploy and configure antivirus (AV) and endpoint detection and response (EDR) solutions to meet the intent and practical expectations of FAR 52.204-21 and CMMC 2.0 Level 1 Control SI.L1-B.1.XIII under the Compliance Framework.

What this requirement means for your organization

At CMMC Level 1 / FAR 52.204-21 the focus is on basic safeguarding of contractor information systems: ensuring endpoints are protected from common malware and that you can detect and respond to straightforward threats. SI.L1-B.1.XIII essentially requires the implementation of malware protection and anti-virus/EDR capabilities appropriate to the environment. For a small business this means deploying an AV/EDR solution with centralized management, keeping signatures/engines up to date, enabling real-time protection, and retaining sufficient event data to demonstrate effective operation under the Compliance Framework.

Deployment checklist — step-by-step practical implementation

1) Inventory, procurement and architecture

Start by documenting all endpoints (Windows, macOS, Linux, mobile if applicable) and classify them (office workstation, laptop, server). Choose a solution that covers those platforms; for small businesses consider built-in, enterprise-grade AV+EDR like Microsoft Defender for Business/for Endpoint (cost-effective), or managed options such as CrowdStrike, SentinelOne, or a vetted MDR provider if you lack in-house staff. Design architecture: cloud-managed console is preferable for centralized policy, updates, and reporting. Ensure licensing covers all devices in your inventory and that your chosen solution provides tamper protection, real-time scanning, and remote isolation capability.

2) Pilot, phased rollout and baseline configurations

Run a pilot on a sample of endpoints (3–10 machines across roles) to validate compatibility with business applications. During pilot create baseline policies: enable real-time scanning, automatic signature/engine updates, cloud-delivered protection, and default blocking for known-bad files. For Windows Defender you can verify status with PowerShell: Get-MpComputerStatus and enable real-time protection with Set-MpPreference -DisableRealtimeMonitoring $false. Test exclusions only where strictly necessary and document each exclusion with justification and approval.

3) Agent installation, connectivity and hardening

Deploy agents using your management tools (Intune, Jamf, SCCM, or scripted installers). For Linux/Unix install via package manager or provided installer and verify the service: systemctl status (for example, falcon-sensor or wazuh-agent). Confirm agents can communicate outbound to vendor cloud endpoints—most EDRs use HTTPS (port 443) to specific FQDNs. Lock down agent configuration: enable tamper protection (via MDM or vendor console where available), restrict local admin modification, and enforce automatic agent updates.</p>

4) Detection, logging and integration

Configure EDR telemetry to send alerts to a central console and, where available, to a SIEM or log archive. Define which events to retain (recommendation: keep endpoint telemetry and alerts for at least 90 days for investigative needs; adjust based on storage and policy). Tune detection thresholds to reduce false positives—start with vendor default rules, classify alerts, and create simple playbooks: alert -> triage -> isolate endpoint -> gather forensic artifacts -> remediate. Ensure alerting to an on-call contact (email + SMS/phone) for critical detections.

5) Remediation and response capabilities

Enable remote containment (isolate network), process termination, quarantining of files, and rollback where supported. Build short runbooks for common scenarios (malicious executable found, persistence artifact detected, credential theft suspected). For small shops without 24/7 staff, contract MDR with SLA for containment, or create a rotation for escalation. Test the response playbook quarterly by simulating a benign test indicator (e.g., EICAR file) and validate the full detection-to-remediation timeline.

6) Ongoing maintenance and evidence for compliance

Automate signature and engine updates and verify update success via scheduled reports. Run weekly or monthly health checks from the management console to confirm agent status, last update time, and coverage gaps. Keep records of deployment, policy baselines, pilot results, exclusions log, and response exercises—these artifacts demonstrate compliance to an assessor under the Compliance Framework. Periodically review licensing and coverage as devices are added or retired.

Real-world small-business scenarios and examples

Example A — 20-seat engineering firm: Implement Microsoft Defender for Business, enroll endpoints with Intune, enable Tamper Protection from the Defender portal, configure cloud-delivered protection and PUA (potentially unwanted application) blocking, and send endpoint alerts to a hosted SIEM (e.g., a lightweight Splunk or Azure Sentinel instance). Test with the EICAR file and document the detection and cleanup steps. Example B — 50-person contractor handling CUI: purchase an MDR offering with quarterly threat-hunting, deploy a lightweight EDR sensor across Windows and Linux servers, and configure the vendor to perform quarantine and host isolation on confirmed malicious activity. Keep written policies and incident logs to support FAR/CMMC audits.

Risks of not implementing or misconfiguring AV/EDR

Without properly deployed and configured AV/EDR you face elevated risk of malware infection, ransomware spread, credential theft, and undetected data exfiltration. From a compliance standpoint, failure to implement these safeguards can lead to loss of contract eligibility, corrective action demands, and reputational damage. Misconfigurations—such as broad exclusions, disabled real-time protection, or lack of tamper prevention—often create the same exposure as having no protection at all. The Compliance Framework expects demonstrable, functioning controls, not just licenses purchased.

Compliance tips and best practices

Keep simple, documented policies: an AV/EDR standard operating procedure (SOP) that covers deployment, exclusions approval, update cadence, and incident handling. Use centralized management for visibility and reporting. Restrict local admin rights to reduce tampering. Where budget is constrained, start with a well-configured, supported solution (e.g., Defender for Business) and add MDR if you cannot staff 24/7 response. Regularly exercise your incident response playbook and maintain artifacts (deployment screenshots, update logs, and detection reports) that an assessor can review during audits under the Compliance Framework.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII is achievable for small businesses by inventorying endpoints, selecting an appropriate AV/EDR solution, piloting and rolling out agents with hardened defaults, integrating telemetry and response playbooks, and maintaining documented evidence of operation—do this consistently and you will both reduce risk and demonstrate compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes